Nowadays, evaluation of software security, as one of the important quality attributes, is of paramount importance. There are many software systems have not considered security in their design; this makes them vulnerable to security risks. Architecture is the most important consideration in software design that affects final quality of software. Quality attributes such as efficiency and reliability have been studied at software architecture level; however, no report has ever been provided about the effect of software architecture on security. The purpose of this paper is to propose a mathematical-based method for evaluating and quantifying software security using the coupling aspects of the software architecture. To achieve this goal, first,...
There is an entire ecosystem of tools, techniques, and processes designed to improve software securi...
Hidden functionality in software is a big problem, because we cannot be sure that the software does ...
Recent large scale cyber security incidents such as the Equifax data breach, where the personal info...
Nowadays, evaluation of software security, as one of the important quality attributes, is of paramou...
The increasing complexity of software systems entails large effort to jointly analyze their non-func...
The increasing complexity of software systems entails large effort to jointly analyze their non-fun...
Enterprise, medium and small companies develop and maintain different types of large-scale software ...
Abstract — Security risk assessment is considered a significant and indispensible process in all ph...
Abstract—The importance of software security has been profound, since most attacks to software syste...
Security principles like least privilege and attack surface reduction play an important role in the ...
Multiple software products often exist on the same server and therefore vulnerability in one product...
Security is no sugar coating that can be added to a software system as an afterthought; a software s...
Abstract: Computer software is a major source of security risks in information systems. To deal with...
Designing optimal architectures for software systems is difficult, as the number of design alternative...
Abstract-Security metrics for software systems provide quantitative measurement for the degree of tr...
There is an entire ecosystem of tools, techniques, and processes designed to improve software securi...
Hidden functionality in software is a big problem, because we cannot be sure that the software does ...
Recent large scale cyber security incidents such as the Equifax data breach, where the personal info...
Nowadays, evaluation of software security, as one of the important quality attributes, is of paramou...
The increasing complexity of software systems entails large effort to jointly analyze their non-func...
The increasing complexity of software systems entails large effort to jointly analyze their non-fun...
Enterprise, medium and small companies develop and maintain different types of large-scale software ...
Abstract — Security risk assessment is considered a significant and indispensible process in all ph...
Abstract—The importance of software security has been profound, since most attacks to software syste...
Security principles like least privilege and attack surface reduction play an important role in the ...
Multiple software products often exist on the same server and therefore vulnerability in one product...
Security is no sugar coating that can be added to a software system as an afterthought; a software s...
Abstract: Computer software is a major source of security risks in information systems. To deal with...
Designing optimal architectures for software systems is difficult, as the number of design alternative...
Abstract-Security metrics for software systems provide quantitative measurement for the degree of tr...
There is an entire ecosystem of tools, techniques, and processes designed to improve software securi...
Hidden functionality in software is a big problem, because we cannot be sure that the software does ...
Recent large scale cyber security incidents such as the Equifax data breach, where the personal info...